Mobile Biometrics, Replay Attacks, and Behavior Profiling: An Empirical Analysis of Impostor Detection.
Tempestt J. NealDamon L. WoodardPublished in: ICB (2019)
Keyphrases
- normal behavior
- detection method
- object detection
- mobile phone
- pattern recognition
- false positives
- automatic detection
- abnormal behavior
- mobile devices
- attack detection
- network attacks
- biometric template
- malicious behavior
- detection rate
- mobile learning
- intrusion detection
- anomaly detection
- false alarms
- mobile computing
- countermeasures
- biometric systems
- computer security
- biometric authentication
- biometric data
- detection algorithm